Projects

ICSI hosts basic, pre-competitive research of fundamental importance to computer science and engineering. Projects are chosen based on the interests of the Institute’s principal investigators and the strengths of its researchers and affiliated UC Berkeley faculty.

Recent projects are listed below; the full list of each group's projects is accessible via the links listed in the sidebar.

Self-organizing network (SON) algorithms that were designed for the self-configuration, self-optimization, and self-healing of today's 4G networks exhibit various drawbacks. The two most severe drawbacks are (1) so-called SON use case coordination - the coordination of conflicting network parameter changes - which can lead to sub-optimal network configurations and, more likely, to a worsening of network performance, and (2) a qualitative and quantitative lack of input information to the SON, making reliable network management cumbersome.

This collaborative project led by LLNL is part of the DARPA TRAnsforming DESign (TRADES) program, and focuses on modeling, analysis and synthesis of complex parameterized multi-scale material structures.

The large-scale data being generated in many application domains promise to revolutionize scientific discovery, engineering and technological development, social science understanding, and our ability to monitor masses and influence behavior in subtle ways. In most applications, however, this promise has yet to be fulfilled. One major reason for this is the dificulty of using, in a low-friction manner, cutting-edge algorithmic and statistical tools to explore the data and develop domain-informed models of the processes generating the data.

In this collaborative project with UC Berkeley, ICSI PIs are working with the lead developer of the "Snowflake" censorship circumvention system to refine the code for production deployment in both the Tor Browser Bundle and as a stand-alone application. The work includes developing instrumentation to measure the usage of Snowflake as its deployment rolls out and analyzing the results to assess Snowflake's impact on enabling circumvention.

One of the Internet’s greatest strengths is the degree to which it facilitates access to any of its resources from users anywhere in the world. Various forces, however, have arisen that restrict particular users from accessing particular destinations, resulting in a "balkanization" of the network. This project explores apt methodologies for understanding such balkanization, an effort we will undertake in the context of examining "regional discrimination," i.e., the degree to which certain web services deny or degrade access to users from particular geographic regions.

In this ICSI project, researchers are working to improve speech recognition from noisy, often distorted audio taken from the body cameras of working police officers during traffic stops. This is part of a larger project at Stanford to extract information from these data. The Stanford project is focused on the analysis of the interactions between the officers and the communities they serve, in the hope that they could help to transform the relationship between the police and communities, produce solid data on officer-community interaction, and inform officer training programs.

A common informal definition of interoperability refers to the ability of a system, whose interfaces are completely understood, to work with other products or systems, present or future, without any restricted access or implementation. In the context of computational design and manufacturing, interoperability subsumes the problems of data sharing, exchange, and translation, as well as the problems of systems integration.

As scientific research requires free exchange of information and ideas among collaborators world-wide, scientists depend critically on full and open access to the Internet. Yet in today’s world, such open access also exposes sites to incessant network attacks. Some of the most powerful networks today remain particularly hard to defend: for the 100G environments and backbones that facilitate modern data-intensive sciences, classic inline firewalls remain infeasible options.

Your mobile phone hosts a rich array of information about you and your behavior. This includes a wide range of unique identifiers and sensitive personal information that enables online tracking, often times for delivering targeted advertisement. It is, however, striking how little insight and control we, as mobile users have into the operation and performance of our devices, into how (or whether) they protect information we entrust to them, and who they share it with.

A key ingredient of any scenario in cloud-based design and manufacturing and, more generally, in cybermanufacturing is the notion of virtualization of software and hardware resources in terms of open, interoperable and composable services. Such virtualization has proved challenging because modern manufacturing information systems are conceived and implemented as a federated integration of proprietary software tools that communicate via customized translators or by exchanging variety of neutral file formats.

Today’s wireless communications solutions provide infrastructure for delivering content. Content delivery occurs either within a constraint island of coverage, within the reach, for example, of a wireless local area network (WLAN), or ubiquitously from anywhere to anywhere using, for example, cellular infrastructure. Content delivered can be, for example, voice, videos, images, and web information. Unfortunately however, wireless communications infrastructure available to us today does not allow for the remote control of real or virtual objects, as end-to-end latency far exceeds 10ms.

Researchers at ICSI are leveraging well-studied individual differences in the psychology literature in order to improve computer security outcomes. Specifically, they are looking at how people with different decision-making styles may be more or less receptive to different types of security messaging. Applying techniques from behavioral economics, the goal is to frame security mitigations for individual users so that they see the security messages that are most likely to have an effect on them.

This project is rethinking how smartphones grant third-party applications access to sensitive user data. Currently, mobile platforms ask the user for permission the first time an application attempts to access certain data types; when access is granted, the user is never asked to make this decision again, even if the context in which subsequent data requests occur are substantially different from the context of the first request. For example, no distinction is made between using location data for location-based features and user tracking.

Streaming algorithms that use every input datum once (single-pass) or scan the input a small number of times (multiple passes) are gaining importance due to the increasing volumes of data that are available for business, scientific, and security applications. Performing large-scale data analysis and machine learning often requires addressing numerical linear algebra primitives, such as L2 regression, singular value decompositions, L1 regression, and canonical correlations.

This project looks into the usage and collection of data by programs that operate behind the scenes. The collected data and its use by a network of sellers, brokers, and marketers represents a direct privacy threat as it can be used for marketing, profiling, crime, or government surveillance, and yet consumers have little knowledge about it and no legal means to access the data. ICSI researchers are conducting surveys and experiments to determine the current status of this data and observe its effects.

In this project, researchers at ICSI are collaborating with Notre Dame to preserve unwritten languages in danger of disappearing. They are recording speech in a variety of genres and styles using mobile technologies. To enable productive linguistic and language-technology research in the future, they are adding respeaking, in which native speakers listen and repeat each phrase slowly and carefully, as well as oral translation, in which bilingual speakers of the language translate the recordings phrase by phrase into a widely used language such as English.

This project leverages and extends the data collection of the ICSI SSL Notary for an extensive study of the real-world TLS/X.509 ecosystem through measurement-centric research. The SSL/TLS protocol suite constitutes the key building block of today’s Internet security, providing encryption and authentication for end-to-end communication with the help of an associated global X.509 public key infrastructure. However, from its first version in 1994 until today, researchers and practioners keep discovering TLS deficiencies undermining the protocol’s security on a regular basis.

This project focuses on establishing a science of censorship resistance. Recent years have seen significant efforts on the part of both practitioners and researchers in countering large-scale Internet censorship imposed by nation-states. Driven by an active arms race, much of the research work in the field has been reactive in nature, lacking solid and methodical foundations.

In this collaborative project, researchers at ICSI, UC Berkeley, and University of Washington are systematically exploring the security and privacy issues brought up by the increasing popularity of wearable computers. The recent demand for devices like Google Glass, smart watches, and wearable fitness monitors suggests that wearable computers may become as ubiquitous as cellphones.

Vulnerable software costs the U.S. economy more than $180 billion a year, and large-scale, remotely exploitable vulnerabilities affecting millions of Internet hosts have become a regular occurrence. This project seeks to reduce the impact of software vulnerabilities in Internet-connected systems by developing measurement-driven techniques for global vulnerability detection, assessment, and mitigation.